Loading…
Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System
As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collabor...
Saved in:
Published in: | IEEE transactions on industrial informatics 2020-03, Vol.16 (3), p.1972-1983 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3 |
---|---|
cites | cdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3 |
container_end_page | 1983 |
container_issue | 3 |
container_start_page | 1972 |
container_title | IEEE transactions on industrial informatics |
container_volume | 16 |
creator | Guo, Shaoyong Hu, Xing Guo, Song Qiu, Xuesong Qi, Feng |
description | As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio. |
doi_str_mv | 10.1109/TII.2019.2938001 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TII_2019_2938001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8818339</ieee_id><sourcerecordid>2345522623</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKt3wUvA89ZJsl_xVmvVQkXBeg5JdrZNbXdrkj3037ulxdO8DM87Aw8htwxGjIF8WMxmIw5MjrgUJQA7IwMmU5YAZHDe5yxjieAgLslVCGsAUYCQA_L5tGntj11p19B3xBjotFoinbTbXRdds3ykY_rsQvTOdBErqpuKLnwXDnncxRU20VkdXdvQr32_3V6Ti1pvAt6c5pB8v0wXk7dk_vE6m4znieWSxURDnYIVJUfAQmuRVSaHGqRMizTNDS9qtLXJtc0BuClMybU0lnFpCpmBRTEk98e7O9_-dhiiWredb_qXios0yzjPuegpOFLWtyF4rNXOu632e8VAHbyp3ps6eFMnb33l7lhxiPiPlyUrhZDiD_oaaMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2345522623</pqid></control><display><type>article</type><title>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</title><source>IEEE Xplore (Online service)</source><creator>Guo, Shaoyong ; Hu, Xing ; Guo, Song ; Qiu, Xuesong ; Qi, Feng</creator><creatorcontrib>Guo, Shaoyong ; Hu, Xing ; Guo, Song ; Qiu, Xuesong ; Qi, Feng</creatorcontrib><description>As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2019.2938001</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Authentication ; Blockchain ; Caching ; caching strategy ; Cloud computing ; Computer simulation ; Consortia ; Cryptography ; Edge computing ; Fault tolerance ; Internet of Things ; Internet of Things (IoT) ; Nodes ; Peer-to-peer computing ; Terminals ; trusted authentication</subject><ispartof>IEEE transactions on industrial informatics, 2020-03, Vol.16 (3), p.1972-1983</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</citedby><cites>FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</cites><orcidid>0000-0003-2481-8774 ; 0000-0002-5706-1483 ; 0000-0002-7899-539X ; 0000-0001-9831-2202 ; 0000-0003-2033-8431</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8818339$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Guo, Shaoyong</creatorcontrib><creatorcontrib>Hu, Xing</creatorcontrib><creatorcontrib>Guo, Song</creatorcontrib><creatorcontrib>Qiu, Xuesong</creatorcontrib><creatorcontrib>Qi, Feng</creatorcontrib><title>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Caching</subject><subject>caching strategy</subject><subject>Cloud computing</subject><subject>Computer simulation</subject><subject>Consortia</subject><subject>Cryptography</subject><subject>Edge computing</subject><subject>Fault tolerance</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Nodes</subject><subject>Peer-to-peer computing</subject><subject>Terminals</subject><subject>trusted authentication</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9kE1LAzEQhoMoWKt3wUvA89ZJsl_xVmvVQkXBeg5JdrZNbXdrkj3037ulxdO8DM87Aw8htwxGjIF8WMxmIw5MjrgUJQA7IwMmU5YAZHDe5yxjieAgLslVCGsAUYCQA_L5tGntj11p19B3xBjotFoinbTbXRdds3ykY_rsQvTOdBErqpuKLnwXDnncxRU20VkdXdvQr32_3V6Ti1pvAt6c5pB8v0wXk7dk_vE6m4znieWSxURDnYIVJUfAQmuRVSaHGqRMizTNDS9qtLXJtc0BuClMybU0lnFpCpmBRTEk98e7O9_-dhiiWredb_qXios0yzjPuegpOFLWtyF4rNXOu632e8VAHbyp3ps6eFMnb33l7lhxiPiPlyUrhZDiD_oaaMQ</recordid><startdate>20200301</startdate><enddate>20200301</enddate><creator>Guo, Shaoyong</creator><creator>Hu, Xing</creator><creator>Guo, Song</creator><creator>Qiu, Xuesong</creator><creator>Qi, Feng</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-2481-8774</orcidid><orcidid>https://orcid.org/0000-0002-5706-1483</orcidid><orcidid>https://orcid.org/0000-0002-7899-539X</orcidid><orcidid>https://orcid.org/0000-0001-9831-2202</orcidid><orcidid>https://orcid.org/0000-0003-2033-8431</orcidid></search><sort><creationdate>20200301</creationdate><title>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</title><author>Guo, Shaoyong ; Hu, Xing ; Guo, Song ; Qiu, Xuesong ; Qi, Feng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Caching</topic><topic>caching strategy</topic><topic>Cloud computing</topic><topic>Computer simulation</topic><topic>Consortia</topic><topic>Cryptography</topic><topic>Edge computing</topic><topic>Fault tolerance</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Nodes</topic><topic>Peer-to-peer computing</topic><topic>Terminals</topic><topic>trusted authentication</topic><toplevel>online_resources</toplevel><creatorcontrib>Guo, Shaoyong</creatorcontrib><creatorcontrib>Hu, Xing</creatorcontrib><creatorcontrib>Guo, Song</creatorcontrib><creatorcontrib>Qiu, Xuesong</creatorcontrib><creatorcontrib>Qi, Feng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Guo, Shaoyong</au><au>Hu, Xing</au><au>Guo, Song</au><au>Qiu, Xuesong</au><au>Qi, Feng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2020-03-01</date><risdate>2020</risdate><volume>16</volume><issue>3</issue><spage>1972</spage><epage>1983</epage><pages>1972-1983</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2019.2938001</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-2481-8774</orcidid><orcidid>https://orcid.org/0000-0002-5706-1483</orcidid><orcidid>https://orcid.org/0000-0002-7899-539X</orcidid><orcidid>https://orcid.org/0000-0001-9831-2202</orcidid><orcidid>https://orcid.org/0000-0003-2033-8431</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1551-3203 |
ispartof | IEEE transactions on industrial informatics, 2020-03, Vol.16 (3), p.1972-1983 |
issn | 1551-3203 1941-0050 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TII_2019_2938001 |
source | IEEE Xplore (Online service) |
subjects | Algorithms Authentication Blockchain Caching caching strategy Cloud computing Computer simulation Consortia Cryptography Edge computing Fault tolerance Internet of Things Internet of Things (IoT) Nodes Peer-to-peer computing Terminals trusted authentication |
title | Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T19%3A53%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain%20Meets%20Edge%20Computing:%20A%20Distributed%20and%20Trusted%20Authentication%20System&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Guo,%20Shaoyong&rft.date=2020-03-01&rft.volume=16&rft.issue=3&rft.spage=1972&rft.epage=1983&rft.pages=1972-1983&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2019.2938001&rft_dat=%3Cproquest_cross%3E2345522623%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2345522623&rft_id=info:pmid/&rft_ieee_id=8818339&rfr_iscdi=true |